Guest Contributor


By Ralph Rodriguez, President and Chief Product Officer at Daon Cyber risks become more prevalent and sophisticated every day. As consumers look to increase their security online, passkeys may be the emerging solution they’re looking for. Passkeys, also referred to as multi-device credentials, provide a more secure alternative to passwords. […]

Five Things to Know about Passkeys for the Enterprise


By Scott Perry, Principal, Crypto and Digital Trust, Schellman For the past several months, crypto companies have been given the lion’s share of attention from boards, businesses and leadership for their failures when audited or assessed. While the consequences are warranted, unfortunately, it seems that the story of cryptography is […]

Beyond the Crypto Noise, Working Towards a Harmonic Digital Economy


By Mohit Malik As technology advances and data storage capacities increase, the use of solid-state drives (SSDs) has become more prevalent. The speed and performance of SSDs make them ideal for the storage of sensitive information, such as financial data, personal information, and confidential business documents. However, when it comes […]

Your Guide to Safe and Secure SSD Disposal: Avoiding Data ...



By Frank von Seth, CEO, cyan digital security Cyber Security is becoming increasingly important in the automotive industry. Developments such as networking, connectivity, and autonomous driving continue to drive digitization in the automotive industry. The challenge is that a higher degree of digitalization also opens up gateways for hackers. However, […]

Cyber Security and Its Importance for the Future of the ...



By Roger Northrop, Chief Technology Officer at Mutare Voice phishing (“vishing”) has emerged as a new and increasingly concerning security vulnerability for businesses. The tactic involves a criminal agent or agents posing as a trusted source in order to trick their victims into divulging passwords or other protected information over […]

Watch out! 5 Reasons Vishing is on the Rise – ...



By Brett Beranek, Vice President & General Manager, Security & Biometrics, Nuance Communications When disruption strikes, fraudsters are incredibly fast to shift their tactics and exploit new vulnerabilities.  During the COVID-19 pandemic, for example, we clearly saw the agility and opportunism of fraudsters as they preyed on consumers’ fear and […]

How Multimodal Biometrics Help Banks and Retailers Fight Fraud During ...


By: Gordon Cooper, Director of Customer Solutions at Ardoq There’s often an allotted margin of error when it comes to business strategy or finance. Mistakes are built into the plan and are, to an extent, an accepted part of the process.  However, the rules couldn’t be more different for enterprise […]

Architecting the Enterprise for Cybersecurity: Visibility-Focused, Data-Backed, and Streamlined


By Pawneet Abramowski Trade/ Economic sanctions are a powerful tool. The rules and regulations dictated by governments for various reasons can majorly impact national economies and affect businesses of all sizes. The war in Ukraine unsurprisingly prompted the President, the US. Treasury department and other nations to increase sanctions against […]

Regulations, Risks and Reputation: The 3Rs to Consider How Sanctions ...




By Kaushal Saraf, Lead Engineer at Atomus Microsoft Azure Active Directory (AD) provides businesses with a cloud-based identity and access management service for safeguarding their resources, applications and services from unauthorized access. As such, it is an integral part of any organization’s security infrastructure. This post will discuss two simple but […]

2 Ways To Create a Robust Security Baseline Using Microsoft ...


By Emily Newton, Editor-in-Chief at Revolutionized Magazine Ensuring data center security is a complex but necessary undertaking. Reliable cybersecurity means accounting for all relevant threats. Malware and social engineering typically take up most people’s focus as they’re among the most common, but distributed denial of service (DDoS) attack prevention deserves attention, […]

Can Your Data Center Safeguards Stop a DDoS Attack In ...